A system of redirecting encrypted requests for content at a web site includes the steps of receiving, at a first web site, data enabling secure communication with a client, receiving, at the first web site, a request for content from the client, identifying an alternate web site to service the request from the client and forwarding a communication associated with the request to the alternate web site including forwarding the data enabling secure communication to the alternative web site. Such an arrangement allows a web site to communicate with a client using encrypted packets without having previously set up a tunneled connection, thereby aiding in disaster recovery and providing a facilitating client proximity detection when traffic is encrypted.
|
4. A data center storing a plurality of resources, the data center comprising:
a table for storing, for at least one resource, a plurality of addresses of alternate data centers storing mirrored copies of the at least one resource;
an interface for establishing a secure communication path with a client device; and
a storage mechanism for storing data enabling secure communication received over an encrypted tunnel with the client device; and
a packet builder for building redirect packets for forwarding to the client to signal the client to redirect requests for the resource to one of the plurality of alternate data centers storing mirrored copies of the resource, the redirect packets being encrypted using the data enabling secure communication with the client device and encapsulated with an encapsulation header including a specified time field and an address of the client wherein the encapsulated encrypted redirect packets are forwarded to the plurality of alternate data centers to enable the encrypted redirect packets to be returned to the client at a time indicated in the specified time field to enable the client to redirect communications to a content provider associated with a first received encapsulated encrypted redirect packet.
1. A method of balancing accesses to mirrored copies of a resource stored at a plurality of alternate content providers, the method performed by a first content provider storing the resource, in a network having encrypted traffic includes the steps of:
storing an address of each of the plurality of alternate content providers that stores a mirrored copy of the resource;
receiving data enabling secure communication with a client over an encrypted tunnel;
receiving an encrypted request from the client for the resource;
forwarding encapsulated encrypted redirect packets to each of the plurality of alternate content providers, the step of forwarding including the steps of building a redirect packet for each of the plurality of alternate content providers, encrypting the redirect packets using the data enabling secure communications with the client to provide an encrypted redirect packet for each of the plurality of alternate content providers and encapsulating the encrypted redirect packets with a header identifying the encrypted packet as a redirect packet, identifying the client and a specified time to forward the encrypted redirect packets to the client to enable the client to redirect communications to a content provider associated with a first received encapsulated encrypted redirect packet.
2. The method according to
3. The method according to
receiving, by the client, at least one encrypted redirect packet in response to the encrypted request;
decrypting the at least one encrypted redirect packet to detect a redirect operation, including determining a source of the at least one encrypted redirect packet, wherein the source of the at least one encrypted redirect packet is other than the first content provider; and
the client forwarding subsequent requests for the resource to a web site indicated as the source of the at least one encrypted redirect packet.
|
This invention relates generally to the field of networking, and more specifically to a system for optimally servicing client requests in a network wherein some of the traffic is encrypted.
As is known in the art, load-balancing solutions are becoming more common to support high-traffic Web sites. Typically high traffic Web sites can't process all requests on a single server. In order to increase the performance of the Web site (where the performance can be measured in response time to requests, among other criteria), one may seek to increase the capabilities of the server supporting the Web site. Rather than move the Web site to a more powerful and expensive hardware, clusters, or farms, of servers are provided, where each of the clusters store mirrored copies of the Web site. As requests are received for access to the Web site, the ‘best’ server cluster is selected to respond to each request. The selection of the ‘best’ server cluster for each web request depends upon a variety of considerations, including the health, user proximity, weights, and response times associated with each of the servers.
Some technologies that attempt to provide a measure of geographic distribution of Web requests rely primarily on Domain Name System (DNS) techniques, which rely on the DNS server alone or in combination with other logic. For example, round robin DNS techniques map multiple IP addresses to a single DNS host name. As clients resolve the hostname, DNS responds by cycling through the multiple IP addresses mapped to the host name. The DNS technique may be further enhanced by using routing metrics or network distance calculation. Alternatively, sets of IP addresses may be associated with geographically diverse DNS servers. While the DNS techniques provide some load sharing capabilities, they are problematic because they are resource intensive to resolve and are typically incapable of being content aware.
An improved load balancing approach for high traffic web sites is implemented in the Alteon line of products provided by Nortel Networks, Ltd. The Alteon product line includes Content Directors (CDs), which are designed to route or load balance requests between web sites. Various data is used in determining the client proximity to the available servers and thus where to route requests. This data includes the distance between server and client, the current health of each site, the response time for each site (indicating the relative load at the site), and the availability of content at each site. The CDs are able make client proximity calculations at TCP connection time using a selection of proximity detection methods. Because the CD can make client proximity calculations at TCP connection time, the CD is able to calculate the closest topographical path between the client and each site, rather than having the calculation performed by the client's local DNS server.
Several of the techniques used by a CD for proximity detection are described in U.S. patent application Ser. No. 09/728,305, entitled “A Method and Apparatus for Discovering Client Proximity”, filed Nov. 30, 2000 by Tenereillo et al. (hereinafter referred to as the Tenereillo patent), incorporated by reference herein. An exemplary method disclosed in the Tenereillo patent is a so-called ‘footrace’ method for determining client proximity. The basic blocks of the footrace method are shown in
At step 26, the CD at Site A that receives the client's initial request acts as a synchronizing CD, and forwards partially built redirect messages to each participating web site (i.e., web sites which store mirrored copies of the content) including itself. The redirect message includes a local domain field and a response time field. The local domain field indicates the local domain to which future requests for the resource should be redirected. When the synchronizing CD partially builds the redirect messages, it leaves the local domain URL portion of this field empty. The response time field stores a time value indicating when the CDs at the participating web sites should forward their rebuilt redirect message back to the client.
At step 28, the CD at each web site that receives the partially built redirect message fills in the local domain field with their own local domain URL to provide a rebuilt redirect message. At the precise time indicated by the response time field, the CD at each participating web site forwards the rebuilt redirect message (with modified local domain URL) back to the client. In essence, a footrace ensues, with the participating web site having the fastest response time winning the footrace back to the client. At step 30, the client breaks the TCP connection with the synchronizing web site (Site A, in the above example, assuming Site A did not win the footrace), and initiates a new TCP connection to the local domain URL retrieved in the ‘winning’ redirect message.
Alternative methods of selecting the most proximate client are also described in the Tenereillo patent, and may include caching the URL of the ‘best’ Web site for client requests and building an HTML page having links between the various Web Site local domain names and the client to permit the client to calculate the round trip time for accessing each local domain.
However, one problem with the above described method of determining the optimum Web site is that is cannot be used in an environment where encrypted traffic is transferred between a client and a server, since certification and authentication is generally done on a point to point (client/server) basis. Accordingly, it would be desirable to determine a method for load balancing web site resources in a network including encrypted traffic.
According to one aspect of the invention, a method of balancing accesses to a resource in a network having encrypted traffic includes the step of storing, at a first web site storing the resource, an address of another web site storing a copy of the resource. The method further includes the step of receiving, at the first web site, a request from a client for the resource, the step of receiving including receiving data enabling secure communication with the client. The method further includes the step of forwarding, by the first web site, a redirect packet to the another web site, the step of forwarding including the step of modifying the redirect packet using the data enabling secure communication with the client.
According to another aspect of the invention, a data center storing a plurality of resources includes a table for storing, for at least one resource, an address of an alternate data center storing a copy of the resource. The data center also includes an interface for establishing a secure communication path with a client device and a storage mechanism for storing data enabling secure communication with the client device. The data center further includes a packet builder for building redirect packets for the mirrored web site, the redirect packets comprising the address of the alternate data center and being modified by the data enabling secure communication with the client device.
With such an arrangement, client proximity calculations may be easily performed to aid in web site load balancing in an encrypted network environment.
According to one aspect of the invention, a method for load balancing web site resources in an environment where traffic is encrypted will now be described. Referring now to
In
Each data center is shown to include a number of components that are used to manage and deliver streaming media content to a coupled client in an efficient manner. Exemplary components that may be included in the data center include a content director (CD) 100 and one or more content servers 102. One function of the content director is to perform load balancing of resource requests across the various data centers that are coupled to the network. It should be noted that the server performance could be further accelerated through the inclusion of a cache device, coupled to the switch, although the present invention is not limited to any particular memory service configuration.
The CD 100 and content servers 102 are shown coupled to a switch 106, which controls access to the network 130. Although a switch is shown, it should be understood that any set of devices typically used to connect to a network could alternatively be used, and the present invention is not limited to the use of any particular network connection device. In one embodiment, a content manager 108 is coupled to the switch to provide system management, content management and accounting management features.
Each Content Director constantly communicates with the other CDs in the network over a TCP/IP connection. In one embodiment, the CDs use a specific protocol referred to as an Interbox Protocol (IBP), although other types of TCP/IP messaging may be used and the present invention is not limited to the use of any specific protocol for communication between CDs. The various data that is exchanged between the CDs includes redirect message (for directing requests for a resource received at one CD to another CD that stores a copy of the resource) and time-stamp information (to allow each CD to monitor the clock of the other data centers for synchronization of operations). As the number of data centers increases, the volume of IBP traffic may impede system efficiency. Thus, according to one embodiment of the invention, the data centers are grouped into global domains and local domains. A global domain includes one or more local domain data centers. When a request is received for a resource, DNS resolves the request to any one of the local domains within the global domain. However, it may be that the local domain selected is not the optimal data center to service the request (whether due to proximity, load, or other factors). The Content Directors, upon receiving the client request, redirect the request to the ‘best’ local domain within the global domain using any number of methods, such as the footrace method described with regard to
However, a problem arises in using the footrace method of
The SSL protocol operates as follows. When a client and server communicate, SSL ensures that the connection is private and secure through encryption and authentication. Authentication confirms that the server and the client are who they say they are, and have the proper authority to access the information. Encryption creates a secure tunnel between the client and server by encrypting the data and through the use of keys that each end uses to encrypt and decrypt the data. As a result, any unauthorized user who obtains the data but does not have the key will be unable to read what is viewed.
An SSL protocol is actually comprised of two protocols; the SSL Handshake protocol and the SSL Record protocol. A transaction consists of two distinct parts: the key exchange and the bulk data transfer. The SSL Handshake Protocol handles the key exchange and the SSL Record Protocol handles the bulk data transfer.
In
Once both the client and server have the same encryption and MAC keys, they use known SSL encryption and authentication mechanisms to create and encrypted tunnel. Through the encrypted tunnel, they can now pass data securely through the internet.
As mentioned in the background, a problem arises when attempting to determine the optimal web site for servicing client requests when the traffic is encrypted using protocols such as the SSL protocol. This is because, as described above, the tunnel is generated between a specific server and client pair. Generally speaking, in order for any other web site to communicate with the client, a similar tunnel should be built between the two. Such a solution is time consuming, and, due to the numerous steps involved in setting up the tunnel, would make it difficult to discern optimal web site for servicing client requests in a timely manner.
However, according to one aspect of the present invention, a system is provided for allowing a mirrored web site to forward encrypted packets to a client without having previously established a tunnel between the web site and the client. This system can be used for two alternative purposes. First, it can be used to seamlessly redirect encrypted requests from a failing web site to an alternative web site in a manner that is transparent to the client. As a result, client requests can be serviced without delay, error messages, or the need to re-establish a new secure session. In addition, the system can also be used to select an optimal web site for servicing client requests using the footrace method discussed above in
Referring now to
The key data storage 157 provides the packet builder 155 with key data for encrypting packets, thereby enabling a CD to internally build encrypted packets for each of the other CDs in its global domain. According to one aspect of the invention, a packet may be pre-built at a first CD, encrypted using the key data that the first CD received when establishing a tunnel with the client, and encapsulated in a communication to a second CD in the same global domain. The second CD recognizes that it is a pre-built packet for the client, strips off header information from the first CD identifying it as such, and forwards the encrypted packet to the client.
Providing a mechanism for a CD to communicate encrypted data to a client without having previously established a tunnel between the particular site and the client provides at least two advantages over the prior art. In the prior art, in the event that a resource becomes unavailable at a first data center, a client has to break down the tunnel with the first data center and build a tunnel with the mirror data center, thereby incurring a delay in obtaining access to the resource. With the invention, the first data center can easily redirect all requests from a client to the mirrored site. Security concerns can be addressed in the background without interrupting the user's access to the resource. Thus the present invention provides a mechanism for disaster recovery.
An example of how the system may work to provide disaster recovery in the event of a server farm failure at Site A is shown in
According to one aspect of the invention, the CDs in each global domain additionally use the IBP to exchange the SSL Session state information required for the alternative site to service the request. Thus, assuming that site B is the alternative site selected, at step 170 site A also forwards the SSL state information for decrypting and encrypting the request to site B. At step 172, site B decrypts the forwarded packet and forwards it to its associated server (or cache) for service. When the content is retrieved, the CD, at step 174, encrypts the content and forwards it directly back to the client. Subsequent traffic flows in a triangular pattern, with requests being made by the client to site A, B and back to the client until either the problem at site A is repaired, or an opportunity exists to tunnel directly to site B.
A second advantage of the present invention is that it allows the footrace method of determining client proximity to be performed even when the clients' requests are encrypted. The footrace may be performed as shown in
At step 182 the client establishes a TCP connection for a global address and a DNS resolves to a web site, for example web site A (hereinafter also referred to! as the synchronizing web site). The client then establishes a secure connection to web site A. Subsequently, at step 184 the client issues a request for resource stored at web site A, but mirrored at alternative sites. At step 186, the synchronizing CD performs expression matching on the global domain name to identify the corresponding local domains in its database (‘participating sites’). At step 188, for each participating site, the CD builds a redirect packet. When building the packet, the CD inserts the local domain name of the associated participating site into the redirect packet and encrypts the packet using the SSL Session ID and keys established with the client during the SSL handshake. The CD then encapsulates the redirect packet into a TCP/IP packet directed to the participating web site, and forwards it to that site. The header of the TCP/IP packet is encoded to identify the packet as an encrypted redirect packet to be used in a footrace, a client address, and a time at which the participating site is to forward the redirect packet to the client address. At step 190, each participating site decodes the TCP/IP header, identifies the packet as an encapsulated redirect, and extracts the redirect packet. At the time indicated by the synchronizing site, each participating site forwards the redirect packet to the client.
When the client receives its first redirect packet, at step 192 it closes the TCP session with the synchronizing CD, and initiates a new, secure connection to the local domain indicated in the first redirect packet received.
Accordingly, a system that enables load balancing of encrypted traffic has been described. The system may be used to provide disaster recovery, or alternatively to identify an optimal data center for servicing client requests. It should be noted that, although the above description has included discussion of the SSL protocol, the present invention may be used for any type of encrypted traffic, and the present invention should not be limited to the use of any specific security protocol.
Having described several embodiments of the invention, it should be understood that various modifications may be made within the spirit and scope of the invention, and the invention, therefore, should only be limited by the claims.
Tenereillo, Peter, Ficik, Craig J.
Patent | Priority | Assignee | Title |
10721211, | Feb 11 2015 | Cisco Technology, Inc. | Hierarchical clustering in a geographically dispersed network environment |
7930757, | Oct 31 2003 | Adobe Inc | Offline access in a document control system |
7995758, | Nov 30 2004 | Adobe Inc | Family of encryption keys |
8108672, | Oct 31 2003 | Adobe Inc | Transparent authentication process integration |
8479301, | Oct 31 2003 | Adobe Inc | Offline access in a document control system |
8627077, | Oct 31 2003 | Adobe Inc | Transparent authentication process integration |
8627489, | Oct 31 2003 | Adobe Inc | Distributed document version control |
8701103, | Oct 31 2007 | Walmart Apollo, LLC | Method and system for minimizing or eliminating downtime when updating a website |
8832047, | Jul 27 2005 | Adobe Inc | Distributed document version control |
9021461, | Oct 31 2007 | Walmart Apollo, LLC | Method and system for minimizing or eliminating downtime when updating a website |
9800549, | Feb 11 2015 | Cisco Technology, Inc. | Hierarchical clustering in a geographically dispersed network environment |
Patent | Priority | Assignee | Title |
6813635, | Oct 13 2000 | Hewlett Packard Enterprise Development LP | System and method for distributing load among redundant independent stateful world wide web server sites |
6850982, | Dec 19 2000 | Cisco Technology, Inc. | Methods and apparatus for directing a flow of data between a client and multiple servers |
6920498, | Aug 31 2000 | Cisco Technology, Inc | Phased learning approach to determining closest content serving sites |
7031311, | Jul 23 2001 | ACME PACKET, INC | System and method for providing rapid rerouting of real-time multi-media flows |
20020129134, | |||
20030174700, | |||
20030229697, | |||
20040093419, |
Executed on | Assignor | Assignee | Conveyance | Frame | Reel | Doc |
Feb 19 2003 | TENEREILLO, PETER | Nortel Networks Limited | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 013824 | /0092 | |
Feb 20 2003 | FICIK, CRAIG T | Nortel Networks Limited | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 013824 | /0092 | |
Feb 27 2003 | Nortel Networks Limited | (assignment on the face of the patent) | / | |||
Dec 18 2009 | Nortel Networks Limited | AVAYA Inc | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 023998 | /0878 | |
Jan 29 2010 | AVAYA Inc | CITIBANK, N A , AS ADMINISTRATIVE AGENT | SECURITY AGREEMENT | 023892 | /0500 | |
Jan 29 2010 | AVAYA Inc | CITICORP USA, INC , AS ADMINISTRATIVE AGENT | SECURITY AGREEMENT | 023905 | /0001 | |
Feb 11 2011 | AVAYA INC , A DELAWARE CORPORATION | BANK OF NEW YORK MELLON TRUST, NA, AS NOTES COLLATERAL AGENT, THE | SECURITY AGREEMENT | 025863 | /0535 | |
Mar 07 2013 | Avaya, Inc | BANK OF NEW YORK MELLON TRUST COMPANY, N A , THE | SECURITY AGREEMENT | 030083 | /0639 | |
Jan 24 2017 | AVAYA INTEGRATED CABINET SOLUTIONS INC | CITIBANK, N A , AS ADMINISTRATIVE AGENT | SECURITY INTEREST SEE DOCUMENT FOR DETAILS | 041576 | /0001 | |
Jan 24 2017 | AVAYA Inc | CITIBANK, N A , AS ADMINISTRATIVE AGENT | SECURITY INTEREST SEE DOCUMENT FOR DETAILS | 041576 | /0001 | |
Jan 24 2017 | VPNET TECHNOLOGIES, INC | CITIBANK, N A , AS ADMINISTRATIVE AGENT | SECURITY INTEREST SEE DOCUMENT FOR DETAILS | 041576 | /0001 | |
Jan 24 2017 | Octel Communications Corporation | CITIBANK, N A , AS ADMINISTRATIVE AGENT | SECURITY INTEREST SEE DOCUMENT FOR DETAILS | 041576 | /0001 | |
Nov 28 2017 | THE BANK OF NEW YORK MELLON TRUST COMPANY, N A | AVAYA Inc | BANKRUPTCY COURT ORDER RELEASING ALL LIENS INCLUDING THE SECURITY INTEREST RECORDED AT REEL FRAME 030083 0639 | 045012 | /0666 | |
Nov 28 2017 | CITIBANK, N A | VPNET TECHNOLOGIES, INC | BANKRUPTCY COURT ORDER RELEASING ALL LIENS INCLUDING THE SECURITY INTEREST RECORDED AT REEL FRAME 041576 0001 | 044893 | /0531 | |
Nov 28 2017 | CITIBANK, N A | AVAYA Inc | BANKRUPTCY COURT ORDER RELEASING ALL LIENS INCLUDING THE SECURITY INTEREST RECORDED AT REEL FRAME 023892 0500 | 044891 | /0564 | |
Nov 28 2017 | CITIBANK, N A | AVAYA Inc | BANKRUPTCY COURT ORDER RELEASING ALL LIENS INCLUDING THE SECURITY INTEREST RECORDED AT REEL FRAME 041576 0001 | 044893 | /0531 | |
Nov 28 2017 | CITIBANK, N A | AVAYA INTEGRATED CABINET SOLUTIONS INC | BANKRUPTCY COURT ORDER RELEASING ALL LIENS INCLUDING THE SECURITY INTEREST RECORDED AT REEL FRAME 041576 0001 | 044893 | /0531 | |
Nov 28 2017 | CITIBANK, N A | OCTEL COMMUNICATIONS LLC FORMERLY KNOWN AS OCTEL COMMUNICATIONS CORPORATION | BANKRUPTCY COURT ORDER RELEASING ALL LIENS INCLUDING THE SECURITY INTEREST RECORDED AT REEL FRAME 041576 0001 | 044893 | /0531 | |
Nov 28 2017 | THE BANK OF NEW YORK MELLON TRUST, NA | AVAYA Inc | BANKRUPTCY COURT ORDER RELEASING ALL LIENS INCLUDING THE SECURITY INTEREST RECORDED AT REEL FRAME 025863 0535 | 044892 | /0001 | |
Dec 15 2017 | OCTEL COMMUNICATIONS LLC | CITIBANK, N A , AS COLLATERAL AGENT | SECURITY INTEREST SEE DOCUMENT FOR DETAILS | 045124 | /0026 | |
Dec 15 2017 | CITICORP USA, INC | SIERRA HOLDINGS CORP | RELEASE BY SECURED PARTY SEE DOCUMENT FOR DETAILS | 045045 | /0564 | |
Dec 15 2017 | CITICORP USA, INC | Avaya, Inc | RELEASE BY SECURED PARTY SEE DOCUMENT FOR DETAILS | 045045 | /0564 | |
Dec 15 2017 | ZANG, INC | CITIBANK, N A , AS COLLATERAL AGENT | SECURITY INTEREST SEE DOCUMENT FOR DETAILS | 045124 | /0026 | |
Dec 15 2017 | VPNET TECHNOLOGIES, INC | CITIBANK, N A , AS COLLATERAL AGENT | SECURITY INTEREST SEE DOCUMENT FOR DETAILS | 045124 | /0026 | |
Dec 15 2017 | AVAYA INTEGRATED CABINET SOLUTIONS LLC | CITIBANK, N A , AS COLLATERAL AGENT | SECURITY INTEREST SEE DOCUMENT FOR DETAILS | 045124 | /0026 | |
Dec 15 2017 | AVAYA Inc | CITIBANK, N A , AS COLLATERAL AGENT | SECURITY INTEREST SEE DOCUMENT FOR DETAILS | 045124 | /0026 | |
Dec 15 2017 | ZANG, INC | GOLDMAN SACHS BANK USA, AS COLLATERAL AGENT | SECURITY INTEREST SEE DOCUMENT FOR DETAILS | 045034 | /0001 | |
Dec 15 2017 | VPNET TECHNOLOGIES, INC | GOLDMAN SACHS BANK USA, AS COLLATERAL AGENT | SECURITY INTEREST SEE DOCUMENT FOR DETAILS | 045034 | /0001 | |
Dec 15 2017 | OCTEL COMMUNICATIONS LLC | GOLDMAN SACHS BANK USA, AS COLLATERAL AGENT | SECURITY INTEREST SEE DOCUMENT FOR DETAILS | 045034 | /0001 | |
Dec 15 2017 | AVAYA INTEGRATED CABINET SOLUTIONS LLC | GOLDMAN SACHS BANK USA, AS COLLATERAL AGENT | SECURITY INTEREST SEE DOCUMENT FOR DETAILS | 045034 | /0001 | |
Dec 15 2017 | AVAYA Inc | GOLDMAN SACHS BANK USA, AS COLLATERAL AGENT | SECURITY INTEREST SEE DOCUMENT FOR DETAILS | 045034 | /0001 | |
Sep 25 2020 | INTELLISIST, INC | WILMINGTON TRUST, NATIONAL ASSOCIATION | SECURITY INTEREST SEE DOCUMENT FOR DETAILS | 053955 | /0436 | |
Sep 25 2020 | AVAYA MANAGEMENT L P | WILMINGTON TRUST, NATIONAL ASSOCIATION | SECURITY INTEREST SEE DOCUMENT FOR DETAILS | 053955 | /0436 | |
Sep 25 2020 | AVAYA Inc | WILMINGTON TRUST, NATIONAL ASSOCIATION | SECURITY INTEREST SEE DOCUMENT FOR DETAILS | 053955 | /0436 | |
Sep 25 2020 | AVAYA INTEGRATED CABINET SOLUTIONS LLC | WILMINGTON TRUST, NATIONAL ASSOCIATION | SECURITY INTEREST SEE DOCUMENT FOR DETAILS | 053955 | /0436 | |
Jul 12 2022 | AVAYA MANAGEMENT L P | WILMINGTON TRUST, NATIONAL ASSOCIATION, AS COLLATERAL AGENT | INTELLECTUAL PROPERTY SECURITY AGREEMENT | 061087 | /0386 | |
Jul 12 2022 | AVAYA CABINET SOLUTIONS LLC | WILMINGTON TRUST, NATIONAL ASSOCIATION, AS COLLATERAL AGENT | INTELLECTUAL PROPERTY SECURITY AGREEMENT | 061087 | /0386 | |
Jul 12 2022 | AVAYA Inc | WILMINGTON TRUST, NATIONAL ASSOCIATION, AS COLLATERAL AGENT | INTELLECTUAL PROPERTY SECURITY AGREEMENT | 061087 | /0386 | |
Jul 12 2022 | INTELLISIST, INC | WILMINGTON TRUST, NATIONAL ASSOCIATION, AS COLLATERAL AGENT | INTELLECTUAL PROPERTY SECURITY AGREEMENT | 061087 | /0386 | |
Apr 03 2023 | CITIBANK, N A , AS COLLATERAL AGENT | AVAYA MANAGEMENT L P | RELEASE OF SECURITY INTEREST IN PATENTS AT REEL 45124 FRAME 0026 | 063457 | /0001 | |
Apr 03 2023 | CITIBANK, N A , AS COLLATERAL AGENT | AVAYA INTEGRATED CABINET SOLUTIONS LLC | RELEASE OF SECURITY INTEREST IN PATENTS AT REEL 45124 FRAME 0026 | 063457 | /0001 | |
Apr 03 2023 | CITIBANK, N A , AS COLLATERAL AGENT | AVAYA Inc | RELEASE OF SECURITY INTEREST IN PATENTS AT REEL 45124 FRAME 0026 | 063457 | /0001 | |
Apr 03 2023 | CITIBANK, N A , AS COLLATERAL AGENT | AVAYA HOLDINGS CORP | RELEASE OF SECURITY INTEREST IN PATENTS AT REEL 45124 FRAME 0026 | 063457 | /0001 | |
May 01 2023 | WILMINGTON TRUST, NATIONAL ASSOCIATION, AS NOTES COLLATERAL AGENT | AVAYA Inc | RELEASE OF SECURITY INTEREST IN PATENTS REEL FRAME 61087 0386 | 063690 | /0359 | |
May 01 2023 | WILMINGTON TRUST, NATIONAL ASSOCIATION, AS NOTES COLLATERAL AGENT | AVAYA MANAGEMENT L P | RELEASE OF SECURITY INTEREST IN PATENTS REEL FRAME 61087 0386 | 063690 | /0359 | |
May 01 2023 | KNOAHSOFT INC | WILMINGTON SAVINGS FUND SOCIETY, FSB [COLLATERAL AGENT] | INTELLECTUAL PROPERTY SECURITY AGREEMENT | 063742 | /0001 | |
May 01 2023 | GOLDMAN SACHS BANK USA , AS COLLATERAL AGENT | ZANG, INC FORMER NAME OF AVAYA CLOUD INC | RELEASE OF SECURITY INTEREST IN PATENTS REEL FRAME 045034 0001 | 063779 | /0622 | |
May 01 2023 | INTELLISIST, INC | WILMINGTON SAVINGS FUND SOCIETY, FSB [COLLATERAL AGENT] | INTELLECTUAL PROPERTY SECURITY AGREEMENT | 063742 | /0001 | |
May 01 2023 | AVAYA Inc | WILMINGTON SAVINGS FUND SOCIETY, FSB [COLLATERAL AGENT] | INTELLECTUAL PROPERTY SECURITY AGREEMENT | 063742 | /0001 | |
May 01 2023 | AVAYA MANAGEMENT L P | WILMINGTON SAVINGS FUND SOCIETY, FSB [COLLATERAL AGENT] | INTELLECTUAL PROPERTY SECURITY AGREEMENT | 063742 | /0001 | |
May 01 2023 | WILMINGTON TRUST, NATIONAL ASSOCIATION, AS NOTES COLLATERAL AGENT | AVAYA MANAGEMENT L P | RELEASE OF SECURITY INTEREST IN PATENTS REEL FRAME 53955 0436 | 063705 | /0023 | |
May 01 2023 | WILMINGTON TRUST, NATIONAL ASSOCIATION, AS NOTES COLLATERAL AGENT | AVAYA Inc | RELEASE OF SECURITY INTEREST IN PATENTS REEL FRAME 53955 0436 | 063705 | /0023 | |
May 01 2023 | WILMINGTON TRUST, NATIONAL ASSOCIATION, AS NOTES COLLATERAL AGENT | INTELLISIST, INC | RELEASE OF SECURITY INTEREST IN PATENTS REEL FRAME 53955 0436 | 063705 | /0023 | |
May 01 2023 | WILMINGTON TRUST, NATIONAL ASSOCIATION, AS NOTES COLLATERAL AGENT | AVAYA INTEGRATED CABINET SOLUTIONS LLC | RELEASE OF SECURITY INTEREST IN PATENTS REEL FRAME 53955 0436 | 063705 | /0023 | |
May 01 2023 | GOLDMAN SACHS BANK USA , AS COLLATERAL AGENT | AVAYA MANAGEMENT L P | RELEASE OF SECURITY INTEREST IN PATENTS REEL FRAME 045034 0001 | 063779 | /0622 | |
May 01 2023 | GOLDMAN SACHS BANK USA , AS COLLATERAL AGENT | CAAS TECHNOLOGIES, LLC | RELEASE OF SECURITY INTEREST IN PATENTS REEL FRAME 045034 0001 | 063779 | /0622 | |
May 01 2023 | GOLDMAN SACHS BANK USA , AS COLLATERAL AGENT | HYPERQUALITY II, LLC | RELEASE OF SECURITY INTEREST IN PATENTS REEL FRAME 045034 0001 | 063779 | /0622 | |
May 01 2023 | WILMINGTON TRUST, NATIONAL ASSOCIATION, AS NOTES COLLATERAL AGENT | AVAYA INTEGRATED CABINET SOLUTIONS LLC | RELEASE OF SECURITY INTEREST IN PATENTS REEL FRAME 61087 0386 | 063690 | /0359 | |
May 01 2023 | INTELLISIST, INC | CITIBANK, N A , AS COLLATERAL AGENT | INTELLECTUAL PROPERTY SECURITY AGREEMENT | 063542 | /0662 | |
May 01 2023 | AVAYA MANAGEMENT L P | CITIBANK, N A , AS COLLATERAL AGENT | INTELLECTUAL PROPERTY SECURITY AGREEMENT | 063542 | /0662 | |
May 01 2023 | AVAYA Inc | CITIBANK, N A , AS COLLATERAL AGENT | INTELLECTUAL PROPERTY SECURITY AGREEMENT | 063542 | /0662 | |
May 01 2023 | GOLDMAN SACHS BANK USA , AS COLLATERAL AGENT | AVAYA Inc | RELEASE OF SECURITY INTEREST IN PATENTS REEL FRAME 045034 0001 | 063779 | /0622 | |
May 01 2023 | GOLDMAN SACHS BANK USA , AS COLLATERAL AGENT | INTELLISIST, INC | RELEASE OF SECURITY INTEREST IN PATENTS REEL FRAME 045034 0001 | 063779 | /0622 | |
May 01 2023 | GOLDMAN SACHS BANK USA , AS COLLATERAL AGENT | AVAYA INTEGRATED CABINET SOLUTIONS LLC | RELEASE OF SECURITY INTEREST IN PATENTS REEL FRAME 045034 0001 | 063779 | /0622 | |
May 01 2023 | GOLDMAN SACHS BANK USA , AS COLLATERAL AGENT | OCTEL COMMUNICATIONS LLC | RELEASE OF SECURITY INTEREST IN PATENTS REEL FRAME 045034 0001 | 063779 | /0622 | |
May 01 2023 | GOLDMAN SACHS BANK USA , AS COLLATERAL AGENT | VPNET TECHNOLOGIES, INC | RELEASE OF SECURITY INTEREST IN PATENTS REEL FRAME 045034 0001 | 063779 | /0622 | |
May 01 2023 | WILMINGTON TRUST, NATIONAL ASSOCIATION, AS NOTES COLLATERAL AGENT | INTELLISIST, INC | RELEASE OF SECURITY INTEREST IN PATENTS REEL FRAME 61087 0386 | 063690 | /0359 | |
May 01 2023 | GOLDMAN SACHS BANK USA , AS COLLATERAL AGENT | HYPERQUALITY, INC | RELEASE OF SECURITY INTEREST IN PATENTS REEL FRAME 045034 0001 | 063779 | /0622 | |
May 01 2023 | AVAYA Inc | AVAYA LLC | SECURITY INTEREST GRANTOR S NAME CHANGE | 065019 | /0231 |
Date | Maintenance Fee Events |
May 05 2010 | ASPN: Payor Number Assigned. |
May 05 2010 | RMPN: Payer Number De-assigned. |
Nov 22 2010 | M1551: Payment of Maintenance Fee, 4th Year, Large Entity. |
Nov 19 2014 | M1552: Payment of Maintenance Fee, 8th Year, Large Entity. |
Dec 10 2018 | M1553: Payment of Maintenance Fee, 12th Year, Large Entity. |
Date | Maintenance Schedule |
Jun 19 2010 | 4 years fee payment window open |
Dec 19 2010 | 6 months grace period start (w surcharge) |
Jun 19 2011 | patent expiry (for year 4) |
Jun 19 2013 | 2 years to revive unintentionally abandoned end. (for year 4) |
Jun 19 2014 | 8 years fee payment window open |
Dec 19 2014 | 6 months grace period start (w surcharge) |
Jun 19 2015 | patent expiry (for year 8) |
Jun 19 2017 | 2 years to revive unintentionally abandoned end. (for year 8) |
Jun 19 2018 | 12 years fee payment window open |
Dec 19 2018 | 6 months grace period start (w surcharge) |
Jun 19 2019 | patent expiry (for year 12) |
Jun 19 2021 | 2 years to revive unintentionally abandoned end. (for year 12) |